by Orlando Scott-Cowley 23rd of January 2015

Phishing - the Speculative Long Con

There’s been a spate of phishing attacks this month seeking to uncover the user credentials for users of various hosted email services. Gmail, Outlook, Yahoo and AOL have all been targeted.

While some reports of the Outlook.com phish seem to have incorrectly claimed it was sent to all 400 million users of the service. Intruth the phishing email was sent to a handful of email addresses in the hope that some would be users of the popular Microsoft service, and be duped into providing their user credentials.

Phishing hacker The most damaging hacks can start with just a simple phishing attack

We don’t yet know the ultimate goal of the attackers, but we do know they have identified both consumer and business email accounts that use these services. And, that they’re hoping to gain access to that service by duping someone into giving up their user credentials with a convincing looking, but malicious, login page.

Look carefully at the Outlook.com example, and you’ll start to uncover the art of a well-crafted and targeted spear-phishing attack. What we’re seeing, thanks to Chris Boyd and Malwarebytes, could be the start of a well thought out campaign that’s hunting for something quite specific, in effect, the beginnings of a long speculative con. So far, we’ve seen a number of Outlook.com email addresses being targeted, in a seemingly random way, as well as some collateral fallout to other email domains.

The worst case scenario is the attackers know who they are looking for; the best case is that this is random. What’s likely to happen next is that the newly compromised account will be used to target someone, or something else, in order to add an air of legitimacy. The attackers are likely to use a further spear-phishing technique that tricks their target into clicking a link that downloads a malware dropper to their computer.

Once we’re at that stage, we can assume it’ll be game over for the target: their computer will have been compromised, the RAT will likely have given the attackers access, and they’ll be making off with data or moving onto their next target.

All of this could take hours, days, weeks or even months, but be sure the attackers have the patience to wait it out.

For enterprise users, this type of breach could be catastrophic (see Sony Pictures). What starts with a simple phish can end in a whole lot more trouble. Enterprise users are generally well protected by their IT teams, but URIs (URLs in emails) are still not as protected as they should be. Consider how often you click a link in an email without thinking about it, assuming that the IT team have deployed enough protection to keep you safe. In reality, the Outlook.com phish, as well as most other types of spear-phishing, are likely to have made it past your enterprise email security gateway. This is exactly what attackers are relying on – they know a malicious file will never get to you, so they try to trick you into clicking their link.

Therefore, protecting the link is the only real way to defeat this threat, and for the enterprise that means adding another layer to the security stack. A layer that can re-write the link and scan it for malicious end points as it’s delivered to the end user. For business users of Office 365 this means a similar layer of security over and above the already useful Exchange Online Protection.

by Orlando Scott-Cowley 15th of January 2015

Obama’s 30-Day Breach Warning Is Just the Beginning

2014 was a tough year for global computer security. New advanced threats, like spear-phishing, have been grabbing the headlines. Barely a week went by without news of a breach, and few companies are starting the year without a nagging sense of vulnerability.

It’s no surprise, therefore, that this week President Obama unveiled plans for three new laws aimed at better protecting citizens’ data. The ‘Personal Data Notification & Protection Act’ proposal establishes a 30-day notification requirement from the discovery of a breach.

Blast furnace Hackers used spear-phishing to breach a German steelworks and cause massive physical damage

But much like similar proposals that have been hotly debated in Europe over recent years, this law is not enough to combat the growing threat on its own. The legislation may help ‘bring peace of mind’ to consumers but it’s just closing the door after the horse has galloped away with your data. Yes, consumers should be warned to change their passwords and check bank statements quickly in light of a breach, but of most importance should be the opportunity for affected companies and law enforcement to work together to identify and shut down the hackers for good. In short, this legislation will do little to tackle this and help prevent the breaches in the first place.

The danger from advanced threats and data breaches just got less digital and more real. In December, the German government revealed details of a sophisticated social engineering and phishing attack that reports say caused “massive damage” to a steelworks’ blast furnace.  According to Wired magazine, we've not seen confirmed physical damage from a cyber-weapon since Stuxnet, the virus revealed in 2010 that ravaged centrifuges in Iran's nuclear facilities.

So, if Target, Home Depot and ICANN taught us anything, it’s that security needs to be a top priority – and IT teams should be even more cautious. With their elevated administrative privileges, IT often becomes the primary target for attacks, as they allow an easy pivot point to gain access inside the network.

These phishing attacks could have been prevented with greater pre-emption of human nature. The bottom line is: without the right protection in place, it's inevitable that one of your employees (even someone in your supply chain) will, sooner or later, receive a seemingly innocent email and click on a dangerous link. For companies without appropriate security and employee education in place, this year will likely be a repeat of the last.


Expert Webcast and Live Q&A - Forrester Research analyst Rick Holland and Mimecast’s Steve Malone share essential advice to protect your business against spear-phishing and targeted attacks.

Join us on Wednesday, January 21 at 11am Eastern (1600 UK, 1800 RSA).

Register Free Here. Webinar now complete.

by Neil Murray 13th of January 2015

2015 Signals the Return of the Security Imperative

This time last year futurologists were predicting the gentle evolution of the Big Data trend. Few would have predicted how dramatic the resurgence of security has been.

Sure, there was a drumbeat of public security breaches like Snowden in play, but the flurry of large-scale breaches in 2014 such as Target, JP Morgan, Home Depot and Sony have fundamentally tipped the balance of where security sits in the planning process for IT teams for the coming few years. It was my central point in the BBC 2015 predictions article you may have seen last week.

Email Security Organizations should reduce reliance on technology solely for security and need to focus on making employees part of the solution – a shared security responsibility.

These breaches were the culmination of months of research and work by the attackers. However, as attackers refine their tools, techniques and processes, breaches will occur in greater numbers and with increasing speed and frequency – the outcome of the growing Crime-as-a-Service industry. In response, larger companies will begin to remove point security solutions and instead aim to provide a broader, more holistic view of their overall security posture.

But it’s not just large organizations under attack. Smaller companies will be increasingly targeted to be used as ‘springboards’ to gain entry to the companies they provide services for or have relationships with. Advanced threats usually equate to more IT investment, and to balance their books smaller companies will continue to look to consolidate vendor security services.

These landmark breaches have also highlighted that all organizations will be forced to reduce their reliance on technology solely for security and will focus on more effective ways to make the employees part of the solution – a shared security responsibility.

There are, of course, other trends to consider in 2015 – wearable tech is now becoming refined, affordable and the consumer has a myriad of choices as a quick glance at CES news shows. These devices will drive an uptick in requests to make corporate information accessible through apps on new types of mobile platforms.  As the perimeter becomes even less defined, organizations will need to reassess their security processes and technologies to compensate.

Something fundamental changed last year. We’re in the midst of the Big Data era, powered by cheap storage, new grid-computing technology and maturing adoption by users. However, now more than ever, we’re reminded of the risks presented by our valuable data falling into the wrong hands.

by Orlando Scott-Cowley 18th of December 2014

Empower Your Mobile Users with an Active Archive

An enterprise information archive should be much more than cheap storage and data resiliency, or place to hunt for (or lose) long forgotten evidence in the event of an eDiscovery case. In fact, the enterprise archive, be it for email, files or IM conversations, now has a vital role to play in increasing employee productivity, rather than just being a dark and dusty vault where data goes to die.

Businesswoman searching archive on the move Boost employee productivity with an active archive

As analyst firm Ovum predicts enterprise end-user mobility will be top of the CIO agenda in 2015, ask yourself how quickly can your users find that two-year-old email or vital attachment while on the move? It’s worth considering how a lack of mobility will affect client response times or employee satisfaction in your organization.

The good news is that the move to better and brighter times has already begun. In its Magic Quadrant for Enterprise Information Archiving 2014, Gartner predicted that by 2019, “75 percent of organizations will treat archived data as an active and "nearline" data source, and not simply as a separate repository to be viewed or searched periodically.” For enterprise CIOs, this means we’ve got roughly five years to think about uncovering value in the vast quantities of data we store for undefined purposes at an undefined point of time in the future.

But balancing the information needs of an increasingly mobile workforce with secure and highly-available services often present a major challenge, particularly for traditional on-premises IT environments. As your data volumes grow exponentially, and you bank more valuable data, many businesses are looking to the cloud to solve these demands.

Elastically scalable storage, predictable subscription costs, performance, ubiquity of access and high availability are important factors but the real advantage here is increased flexibility around scale and style of deployment as well as use of these services. Cloud archives can more easily accommodate connections to live Outlook services, SharePoint and third-party APIs. Moving the email archive to the cloud makes it easier to allow employees to search all of their data through their phones and tablets, a simple victory that is largely unsupported by on-premises archive vendors. All of these reasons mean an ‘active archive’ can only exist in the cloud; the limitations to performance, scalability, access, security and usage are too great when the archive remains on-premises.

Cloud archiving vendors are also the only type of technology vendor who are going to have a product roadmap that aims to create new and innovative ways to bring your data to life. Most cloud firms roll out changes, improvements and new features on a continuous delivery schedule so there is always something new to delight your end users. By contrast, older less agile, on-premises technology vendors are usually stuck to a rigid multi-year release cycle that imposes significant burdens on your technical team – re-indexing your archive because of new ‘engines’ or search providers is a great example from two of the market leaders of on-premises archive technology. We don’t want to do that again in a hurry, that’s for sure.

Having an active archive for your enterprise information offers the business a single, secure repository in the cloud in which all your corporate memory can be stored is a simple, yet highly effective and strategic way for the long term retention of your data. For your end users, simply supporting their use of mobile devices will be a significant coup in what is seen as a stodgy and un-cooperative application service. But, continuing to delight them with ways of experiencing and interacting with that data today and into the future will at last give them a way to find more productive ways of working.

If you’re stuck in the past and trying to break free from the aging and outmoded on-premises archive, this video may help you. I recently sat down with Gartner research director, Alan Dayley, to break down the benefits of the cloud over on-premises email archiving.

WATCH the video.